From the book lists at Adware Report:

All information current as of 14:02:33 Pacific Time, Monday, 21 February 2005.

Internet Security Dictionary

   by Vir V. Phoha

  Paperback:
    Springer-Verlag
    10 July, 2002

   US$29.64 

   Usually ships in 24 hours

Click the button below to . . .

    
(which will add the book to your Amazon U.S.A. "Shopping Cart")

. . . or use your browser's Back button to return to the search-list page.

Editorial description(s):

Book Info
Dictionary provides authoritative definitions and descriptions of terms related to Internet security. Details over 1,400 terms and covers 8 main areas. Softcover. CD-ROM included.


About the Author
ADVISORY EDITORIAL BOARD

Dr. Elisa Bertino, Member of the editorial boards of several scientific journals, including ACM Transactions on Information and System Security, IEEE Internet Computing, and International Journal of Information Security.

Dr. Dorothy E. Denning, Member of the President's Expert Council Subcommittee on Encryption Policy. Author of Information Warfare and Security and Cryptography and Data Security.

Dr. Csilla Farkas, Professor of the Department of Computer Science and Engineering at University of South Carolina. Her research includes database security, access control models and security of web-based applications.

Dr. Robert Filman, Associate Editor-in-Chief of IEEE Internet Computing and on the Editorial Board of the International Journal of Artificial Intelligence Tools.

Dr. Dieter Gollmann, Co-Editor-in-Chief of the International Journal of Information Security. He has been serving on the program committees of the major European conferences on computer security (ESORICS) and cryptography (EUROCRYPT), and of other international conferences in these areas.

Dr. Li Gong, Sun's Chief Java Security Architect. Author of Inside Java 2 Platform Security.

Dr. S.S. Iyengar, Series Editor of Neuro Computing of Complex Systems and Area Editor for the Journal of Computer Science and Information. Over 250 research publications.

Dr. Stephen Kent has chaired the Privacy and Security Research Group of the Internet Research Task Force since its inception in 1985. He is also the co-chair of the Public Key Infrastructure working group.

Dr. John McLean, Director of the Center for High Assurance Computer Systems and Senior Scientist for Information Assurance at the Naval Research Laboratory.

Dr. Alfred Menezes is on the editorial board of Designs, Codes, and Cryptography and an accreditation board member of Computer & Communications Security Reviews.

Dr. Flemming Nielson, Site leader for the project Secure and Safe Systems based on Static Analysis funded by the European Union. Author of several books and numerous journal and conference articles.

Dr. Eiji Okamoto, Editor-in-Chief of International Journal of Information Security, General Co-Chair of ISC2001 and many other conferences and symposia in information security.

Dr. Shashi Phoha, Chair of the Technical Advisory Board. Director of Information Science and Technology Division at the Applied Research Laboratory and Professor of Electrical and Computer Engineering, Pennsylvania State University.

Dr. Asok Ray, Editor of IEEE Transactions on Aerospace and Electronic Systems and Associate Editor of IEEE Transactions on Control Systems Technology.

Jeffery Schiller is a co-author of Kerberos cryptographic authentication system, which is a widely used in secure operating environments.

Dr. John Yesberg, Senior Research Scientist at Australia's Defense Science and Technology Organization, specializing in high assurance information security systems.


Book Description
The explosive growth of the Internet, inherent flaws in its basic structure, and the need to transfer sensitive information for Internet applications like electronic mail, Internet banking and Internet commerce have resulted in serious security concerns. This dictionary provides authoritative definitions and descriptions of terms related to Internet security.

The Internet Security Dictionary details over 1,800 terms and covers eight main areas: * Authentication, including biometrics, encryption/public key infrastructure, digital signatures, time-stamping, and certificate management * Encryption * Network-level security, including IP, IPSec, SHTTP, and SSL * Firewalls and remote management * Internet security policies, risk analysis, integration across platforms, management and auditing * Mobile code security, Java/Active X/scripts, and mobile agent code * Virus protection and intrusion detection * Security in Internet commerce.

Security experts from around the world have been consulted in both the content and organization of the dictionary to ensure authoritative, comprehensive coverage.

An accompanying CD-ROM contains the entire content of the dictionary as well as additional web resources.





Reader review(s):

A necessary reference for all who are online, November 3, 2002
If you connect to the Internet, then you pose a security risk to others. With the growing dependence of our global economy on computers, it is now a point of civic duty that we all do what we can to implement secure procedures on our computers. It all starts with knowing what the terms and acronyms mean, and they are all found in this book. I consider it an indispensable resource, not only for the definitions but also for the web sites with a focus on computer security.
The contents of the book are also on a CD in searchable PDF form. This is especially helpful, in that you can quickly click your way to an explanation of any term. The dictionary was put together under the guidance of an expert team of computer security professionals, so it is accurate and thorough. It belongs on the reference shelves of every academic and public library.

A Necessary Desk Companion, October 15, 2002
I use Internet regularly for work and play and I am interested in the security issues. This is perhaps a most comprehensive collection of terms at one place. I was impressed by the logical organization of the book; clear and lucid explaination of terms. The figures in support to explain terms are very helpful.

A rich combination of scholarly work written in a conversational style makes it a must to have. If you work in security related area or in computer science, I would recommend to keep a copy on the desk.

This is a masterpiece, November 24, 2002
I am a computer science graduate student just starting to work on my thesis in Internet security area. I need to read many papers and need a ready reference to clarify and understand the terms used in the papers. This book has been god-send; at one place it gives all the major concepts organized alphabetically so it is east to search and an index is a great help; it has a ready list of references; it is useful I think. The definitions have enough details to understand the concept and figures help.

Since the terms are reviewed by a panel of world-known experts in security I know that I am looking at reliable definitions and descriptions. The language of the book is so easy to understand that my husband who does not work in computer science, has taken to read this book; he just sits and browses through this book. Take the case of the description of a virus; after the definition, the book describes when and how the term virus was used: ��the first published use of the word VIRUS was by David Gerrod in his science fiction short stories which were later expanded and published in the book ��When Harlie was one����������.��, ��Fred Cohen first used the term computer virus in a formal way at university of Southern California��.�� It gives three references pointing the reader to further information. This is a masterpiece written in a scholarly style yet is understandable with little computer science knowledge.

A technical reference, November 15, 2002
It is a technical reference book, perhaps not for a layman or a casual
user
of the Internet. Details and references (and citations for the
references
within the text) make it an excellent resource. If you are taking
security
certification exam or you are consulting, I suggest to keep a copy for
ready
reference.

A novel idea well executed, October 30, 2002
When I first bought this book I was of the idea that it would help only those people who were well acclimatised with the science of internet security. But I was wrong.
Let me get into the facts and tell you that this book had been a great learning experience for me from the time I possesed it. The most remarkable feature about this book is the variety of topics covered and at the same time the details which have been looked into.
Some terms have been used which a normal reader ignores because they sometimes donot contribute too much to the overall understanding of the concept of the journal or paper.
For example everybody knows about firewall. But terms like these have been well explained and illustrated.
Illustrations are another good point about this book which require highlighting. Almost every page in this book is studded with illustrations which helps even a novice to undestand concepts.
The abbreviation section glossary adds to the feathers.
In all I ma having a great learnign experience. I would definately recommend this book for all IT and comp enthusiasts. Its a valuable possession and shall help in a long way.
A great pece of work.

A novel idea well executed, October 30, 2002
When I first saw this book I had the idea that it would be beneficial to only those who are well acclimatised with the science of Internet Security. But I was wrong. This book has been beneficial to me like any other computer book I have gone through. Let me get into the facts.
The most remarkable feature of this book is that care has been taken to include even the commonest of terms which one comes accross reading technical journals but one is ignorant to the actual meaning of them since these terms donot contribute too much to the overall understanding of the concept presented in any paper.
for example we come accross the term 'firewall' so often. but one normally does'nt care to go into the technical details of it.
So I would suggest read this book and findout what firewall actually is.
This book contains both details and variety. I was personally extremely thrilled to find the illustrations in almost every page.
These illustrations helps me ot understand the concepts fast.

Also important is the abbreviation term glossary whcih removes in mind any doubt about the greatness of this book.
With this book I am experiencing a great learning experience and I would recommend this book highly to any computer and IT enthusiast.
Alltogether a great work.


{end of page}

(Page code from the SEO Tools, Toys, and Packages site)